Advertisement

Trust and Reputation

  • Sarah N. Lim Choi KeungEmail author
  • Nathan Griffiths
Chapter
Part of the Advanced Information and Knowledge Processing book series (AI&KP)

Abstract

Trust and reputation have become standard approaches for supporting the management of interactions in distributed environments. Several alternative approaches have been proposed that take a wide range of approaches, including socio-cognitive, computational, and reputational mechanisms. In this chapter we introduce the various approaches to trust and reputation, and discuss how they relate to agents in a service-oriented computing context.

Keywords

Multiagent System Trust Management Reputation System Reputation Score Trust Degree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS 2000), page 6007. IEEE Computer Society, 2000.Google Scholar
  2. 2.
    K. Aberer, P. Cudré-Mauroux, A. Datta, Z. Despotovic, M. Hauswirth, M. Punceva, and R. Schmidt. P-Grid: a self-organizing structured P2P system. ACM SIGMOD Record, 32(3):29–33, 2003.CrossRefGoogle Scholar
  3. 3.
    K. Aberer, A. Datta, and M. Hauswirth. P-grid: Dynamics of self-organizing processes in structured peer-to-peer systems. In R. Steinmetz and K. Wehrle, editors, Peer-to-Peer Systems and Applications, volume 3485 of Lecture Notes in Computer Science, pages 137–153. Springer-Verlag Berlin Heidelberg, 2005.Google Scholar
  4. 4.
    K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the tenth international conference on Information and knowledge management (CIKM 2001), pages 310–317, New York, NY, USA, 2001. ACM.Google Scholar
  5. 5.
    M. D. Abrams and M. V. Joyce. New thinking about information technology security. Computers and Security, 14(1):69–81, 1995.CrossRefGoogle Scholar
  6. 6.
    M. D. Abrams and M. V. Joyce. Trusted computing update. Computers and Security, 14(1):57–68, 1995.CrossRefGoogle Scholar
  7. 7.
    E. Adar and B. A. Huberman. Free riding on gnutella. First Monday, 5(10), 2000.Google Scholar
  8. 8.
    B. K. Alunkal, I. Valjkovic, G. von Laszewski, and K. Amin. Reputation-based grid resource selection. Workshop on Adaptive Grid Middleware (AGridM 2003), September 28, 2003, New Orleans LA, USA. To appear in Journal of Parallel and Distributed Computing Practices.Google Scholar
  9. 9.
    R. Axelrod and W. D. Hamilton. The evolution of cooperation. Science Magazine, 211(4489), 1981.Google Scholar
  10. 10.
    F. Azzedin and M. Maheswaran. Evolving and managing trust in grid computing systems. In Proceedings of the IEEE Canadian Conference on Electrical & Computer Engineering (CCECE 2002), volume 3, 2002.Google Scholar
  11. 11.
    F. Azzedin and M. Maheswaran. Integrating trust into grid resource management systems. In Proceedings of the 2002 International Conference on Parallel Processing (ICPP 2002), page 47, Washington, DC, USA, 2002. IEEE Computer Society.Google Scholar
  12. 12.
    S. Braynov and T. Sandholm. Contracting with uncertain level of trust. In Proceedings of the 1st ACM conference on Electronic commerce. ACM Press, 1999.Google Scholar
  13. 13.
    S. Braynov and T. Sandholm. Trust revelation in multiagent interaction. In Proceedings of CHI 2002 Workshop on The Philosophy and Design of Socially Adept Technologies, 2002.Google Scholar
  14. 14.
    V. Buskens. Social networks and the effect of reputation on cooperation. ISCORE Paper No. 42, Utrecht University, 1998.Google Scholar
  15. 15.
    Cambridge University Press. Cambridge Dictionaries Online. Available online at http://dictionary.cambridge.org.
  16. 16.
    C. Castelfranchi and R. Falcone. Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In Proceedings of the International Conference of Multi-Agent Systems (ICMAS 1998), pages 72–79, 1998.Google Scholar
  17. 17.
    C. Castelfranchi and R. Falcone. Socio-cognitive theory of trust. Deliverable report D1, ALFEBIITE, 2001.Google Scholar
  18. 18.
    Cheskin Research and Studio Archetype/Sapient. eCommerce trust report. Technical report, Cheskin Research, 1999.Google Scholar
  19. 19.
    F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a p2p network. In Proceedings of the 11th international conference on World Wide Web (WWW 2002), pages 376–386, New York, NY, USA, 2002. ACM.Google Scholar
  20. 20.
    N. Curtis, R. Safavi-Naini, and W. Susilo. X2rep: Enhanced trust semantics for the xrep protocol. In Applied Cryptography and Network Security (ACNS), volume 3089 of Lecture Notes in Computer Science, pages 205–219. Springer-Verlag Berlin Heidelberg, 2004.Google Scholar
  21. 21.
    E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, November 2002.Google Scholar
  22. 22.
    B. Esfandiari and S. Chandrasekharan. On how agents make friends: Mechanisms for trust acquisition. In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies, 2001.Google Scholar
  23. 23.
    R. Falcone and C. Castelfranchi. The socio-cognitive dynamics of trust: Does trust create trust? In Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives. Springer-Verlag, 2000.Google Scholar
  24. 24.
    R. Falcone and C. Castelfranchi. Social trust: A cognitive approach. In Cristiano Castelfranchi and Yao-Hua Tan, editors, Trust and Deception in Virtual Societies, pages 55–90. Kluwer Academic Publishers, Netherlands, 2001.CrossRefGoogle Scholar
  25. 25.
    R. Falcone, G. Pezzulo, and C. Castelfranchi. A fuzzy approach to a belief-based trust computation. In R. Falcone, S. Barber, L. Korba, and M. Singh, editors, Trust, Reputation and Security: Theories and Practice, volume 2631 of Lecture Notes in Artificial Intelligence. Springer-Verlag, 2003.Google Scholar
  26. 26.
    D. Farenholtz and W. Lamesdorf. Transactional security for a distributed reputation management system. In Proceedings of the Third Interantional Conference on E-Commerce and Web Technologies (EC-WEB 2002), volume 2455 of Lecture Notes in Computer Science, pages 214–223. Springer, 2002.Google Scholar
  27. 27.
    D. Gambetta. Can we trust trust? In Trust: Making and Breaking of Cooperative Relations, pages 213–237. Department of Sociology, University of Oxford, 2000.Google Scholar
  28. 28.
    T. Grandison and M. Sloman. A survey of trust in internet applications. IEEE Communications and Surveys, 3(4), Fourth Quarter 2000.Google Scholar
  29. 29.
    N. Griffiths. Task delegation using experience-based multi-dimensional trust. In Proceedings of the 4th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), pages 489–496, New York, NY, USA, 2005. ACM Press.Google Scholar
  30. 30.
    N. Griffiths. Enhancing peer-to-peer collaboration using trust. International Journal of Expert systems with Applications, 31(4):849–858, 2006.MathSciNetCrossRefGoogle Scholar
  31. 31.
    N. Griffiths, K.-M. Chao, and M. Younas. Fuzzy trust for peer-to-peer systems. In Proceedings of P2P Data and Knowledge Sharing Workshop (P2P/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006), 2006.Google Scholar
  32. 32.
    N. Griffiths and M. Luck. Cooperative plan selection through trust. In Proceedings of Multi-Agent System Engineering: Proceedings of the Ninth European Workshop on Modelling Autonomous Agents in a Multi-Agent World, volume 1647 of Lecture Notes in Artificial Intelligence, 1999.Google Scholar
  33. 33.
    M. Gupta, P. Judge, and M. Ammar. A reputation system for peer-to-peer networks. In Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2003), pages 144–152. ACM, 2003.Google Scholar
  34. 34.
    S. P. Hargreaves-Heap and Y. Varoufakis. Game Theory: A Critical Introduction. Routledge, London, UK, 1997.Google Scholar
  35. 35.
    T. D. Huynh, N. R. Jennings, and N. Shadbolt. Developing an integrated trust and reputation model for open multi-agent systems. In Proceedings of the 7th International Workshop on Trust in Agent Societies, pages 65–74, New York, USA, 2004.Google Scholar
  36. 36.
    T. D. Huynh, N. R. Jennings, and N. Shadbolt. An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems, 13(2):119–154, 2006.CrossRefGoogle Scholar
  37. 37.
    A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, 2007.CrossRefGoogle Scholar
  38. 38.
    R. Jurca and B. Faltings. Reputation-based pricing of P2P services. In Proceedings of the Third Workshop on Economics of Peer-to-Peer Systems (P2PECON 2005), Philadelphia, USA, 2005.Google Scholar
  39. 39.
    S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th international conference on World Wide Web (WWW 2003), pages 640–651, New York, NY, USA, 2003. ACM.Google Scholar
  40. 40.
    F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson. PathTrust: A trust-based reputation service for virtual organization formation. In Proceedings of the 4th International Conference on Trust Management, 2006.Google Scholar
  41. 41.
    B. Kosko. Fuzzy cognitive maps. International Journal Man-Machine Studies, 24, 1986.Google Scholar
  42. 42.
    D. M. Kreps and R. Wilson. Reputation and imperfect information. Journal of Ecomonic Theory, 27, 1982.Google Scholar
  43. 43.
    S. Kuhn. Prisoner’s dilemma. The Stanford Encyclopedia of Philosophy (Fall 2003 Edition), Edward N. Zalta (ed.), available at http://plato.stanford.edu/archives/fall2003/entries/prisoner-dilemma/, 2003.
  44. 44.
    Z. Liang and W. Shi. Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Networks Applications, 10(6):971–983, 2005.CrossRefGoogle Scholar
  45. 45.
    Z. Liang and W. Shi. PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005)–-Track 7, page 201.2, Washington, DC, USA, 2005. IEEE Computer Society.Google Scholar
  46. 46.
    C.Y. Liau, X. Zhou, S. Bressan, and K.-L. Tan. Efficient distributed reputation scheme for peer-to-peer systems. In Proceedings of the 2nd International Human.Society@Internet Conference (HSI 2003), volume 2713 of Lecture Notes in Computer Science, pages 54–63, Berlin Heidelberg, 2003. Springer-Verlag.Google Scholar
  47. 47.
    S. Marsh. Formalising trust as a computational concept. PhD thesis, Department of Computer Science, University of Stirling, 1994.Google Scholar
  48. 48.
    S. Marsh. Optimism and pessimism in trust. In H. Geffner, editor, Proceedings of IV Ibero-American Conference on Artificial Intelligence (IBERAMIA 1994), pages 286–297. Addison-Wesley, 1994.Google Scholar
  49. 49.
    S. Marsh and M. R. Dibben. Trust, untrust, distrust and mistrust – an exploration of the dark(er) side. In P. Herrmann et al., editor, iTrust 2005, Lecture Notes in Computer Science, volume 3477, pages 17–33, Berlin Heidelberg, 2005. Springer-Verlag.Google Scholar
  50. 50.
    N. Mezzetti. A socially inspired reputation model. In Proceedings of the 1st European PKI Workshop (EuroPKI 2004). Springer-Verlag, 2004.Google Scholar
  51. 51.
    L. Mui, M. Mohtashemi, and A. Halberstadt. A computational model of trust and reputation for e-businesses. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002), volume 7, page 188, Washington, DC, USA, 2002. IEEE Computer Society.Google Scholar
  52. 52.
    A. Oram, editor. Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology. O’Reilly, Sebastopol, CA, USA, 2001.Google Scholar
  53. 53.
    R. A. Pagell and M. Halperin. International Business Information: How to Find It, How to Use It. Greenwood Publishing Group, 1998.Google Scholar
  54. 54.
    J. Patel, W. T. L. Teacy, N. R. Jennings, and M. Luck. A probabilistic trust model for handling inaccurate reputation sources. In Proceedings of the Third International Conference on Trust Management, 2005.Google Scholar
  55. 55.
    J. Patel, W. T. L. Teacy, N. R. Jennings, M. Luck, S. Chalmers, N. Oren, T. J. Norman, A. Preece, P. M. D. Gray, G. Shercliff, P. J. Stockreisser, J. Shao, W. A. Gray, N. J. Fiddian, and S. Thompson. CONOISE-G: Agent-based virtual organisations for the grid. In Proceedings of the 1st International Workshop on Smart Grid Technologies, 2005.Google Scholar
  56. 56.
    S. D. Ramchurn, D. Huynh, and N. R. Jennings. Trust in multi-agent systems. The Knowledge Engineering Review, 19(1):1–25, 2004.CrossRefGoogle Scholar
  57. 57.
    S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Prentice Hall, New Jersey, USA, second edition, 2003.zbMATHGoogle Scholar
  58. 58.
    J. Sabater. Trust and Reputation in Agent Societies. PhD thesis, Universitat Aùtomata de Barcelona (UAB), Spain, 2003.Google Scholar
  59. 59.
    J. Sabater. Evaluating the ReGreT system. Applied Artificial Intelligence, 18, 2004.Google Scholar
  60. 60.
    J. Sabater and C. Sierra. A reputation model for gregarious societies. In Fourth Workshop on Deception Fraud and Trust in Agent Societies, pages 61–70, 2001.Google Scholar
  61. 61.
    J. Sabater and C. Sierra. Review on computational trust and reputation models. Artificial Intelligence Review, 24:33–60, 2005.CrossRefGoogle Scholar
  62. 62.
    M. Schillo. Trust and Deceit in Multi-agent Systems. PhD thesis, Department of Computer Science, Saarland University, Germany, 1999.Google Scholar
  63. 63.
    M. Schillo, P. Funk, and M. Rovatsos. Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence, Special Issue on trust, Deception, and Fraud in Agent Societies, 14(8):825–848, 2000.Google Scholar
  64. 64.
    J. Scott. Social Network Analysis: a handbook. Sage Publications, London, UK, 2001.Google Scholar
  65. 65.
    S. Sen. Reciprocity: A foundational principle for promoting cooperative behavior among self-interested agents. In Victor Lesser, editor, Proceedings of the First International Conference on Multiagent Systems, pages 322–329. MIT Press, 1996.Google Scholar
  66. 66.
    S. Sen and P. S. Dutta. The evolution and stability of cooperative traits. In C. Caltelfranchi and L. Johnson, editors, Proceedings of the First Intenational Joint Conference on Autonomous Agents and Multiagent Systems, volume 3, pages 1114–1120. ACM Press, 2002.Google Scholar
  67. 67.
    M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: Countering vulnerabilities in reputation management for decentralized networks. In Proceedings of the 14th World Wide Web Conference (WWW 2005), pages 422–431. ACM, 2005.Google Scholar
  68. 68.
    R. Steinmetz and K. Wehrle. What is this “peer-to-peer” about? In R. Steinmetz and K. Wehrle, editors, Peer-to-Peer Systems and Applications, volume 3485 of Lecture Notes in Computer Science, pages 9–16. Springer-Verlag Berlin Heidelberg, 2005.Google Scholar
  69. 69.
    I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 149–160, New York, NY, USA, 2001. ACM.Google Scholar
  70. 70.
    W. T. L. Teacy, J. Patel, N. Jennings, and M. Luck. TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2):183–198, 2006.CrossRefGoogle Scholar
  71. 71.
    J. von Newmann and O. Morgenstern. Theory of Games and Economic Behaviour. Princeton University Press, 60th anniversary edition edition, 2004.Google Scholar
  72. 72.
    K. Walsh and E. Gün Sirer. Experience with an object reputation system for peer-to-peer filesharing. In Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design & Implementation (NSDI 2006), pages 1–14, Berkeley, CA, USA, 2006. USENIX Association.Google Scholar
  73. 73.
    F. E. Walter, S. Battiston, and F. Schweitzer. A model of a trust-based recommendation system on a social network. Journal of Autonomous Agents and Multi-Agent Systems, 16(1):57–74, 2008.CrossRefGoogle Scholar
  74. 74.
    A. J. Wells. Grid Application Systems Design. Auerbach Publications, Boca Raton, FL, USA, 2008.Google Scholar
  75. 75.
    M. Witkowski, A. Artikis, and J. Pitt. Experiments in building experiential trust in a society of objective-trust based agents. In R. Falcone, M. Singh, and Y. H. Tan, editors, Trust in Cyber Societies, volume 2246 of Lecture Notes in Artificial Intelligence, pages 111–132. Springer-Verlag, 2001.Google Scholar
  76. 76.
    M. Witkowski and J. Pitt. Objective trust-based agents: Trust and trustworthiness in a multi-agent trading society. In Proceedings of the 4th International Conference on MultiAgent Systems (ICMAS 2000), 2000.Google Scholar
  77. 77.
    D. J. Wu and Y. Sun. The emergence of trust in multi-agent bidding: A computational approach. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS 2001), volume 1, page 1041, Washington DC, USA, 2001. IEEE Computer Society.Google Scholar
  78. 78.
    L. Xiong and L. Liu. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 2004.Google Scholar
  79. 79.
    G. Zacharia and P. Maes. Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9):881–907, 2000.CrossRefGoogle Scholar
  80. 80.
    G. Zacharia, A. Moukas, and P. Maes. Collaborative reputation mechanisms in electronic marketplaces. In Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences, volume 8, page 8026. IEEE Computer Society, 1999.Google Scholar
  81. 81.
    L. Zadeh. Fuzzy sets. Information and Control, 8, 1965.Google Scholar

Copyright information

© Springer-Verlag London 2010

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of WarwickCoventryUK

Personalised recommendations